609 skills found · Page 5 of 21
sisoe24 / NukeserversocketA Nuke plugin that will allow execution of commands from your local network
vishalsingh45 / SDN DDOS Detection And Mitigation Using ML And Statistical MethodsProgrammed the SDN controller to monitor the traffic, predict the traffic behaviour and detect DDOS traffic in the cloud network and mitigate it. Machine learning SVM algorithm was used to predict the malicious traffic in the network, achieved an accuracy of 98% and detection rate of 100%. Technologies Used are, SDN, ML SVM, Openflow, Ryu controller, Python, Mininet, iperf, hping3, linux commands.
mamantoha / ZipstreamA command line tool that allows you to easily share files and directories over the network
ypereirareis / Vagrant Elasticsearch Cluster[NOT MAINTAINED] Create an ElasticSearch cluster with a simple single bash command. Config through environment variables: RAM, cluster name, number of nodes, network ip,...
KylerCondran / RemoteAdminToolA CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 commands.
Hackingzone / Winpirateto grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords Download git clone https://github.com/pourquoibenoit/WinPirate.git This project is still in progress Estimated Completion Date: soon…ish Here’s the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were there. All without being detected by antivirus we should add a mimikittenz option if the computer was found running and unlocked, otherwise we can just run it later remotely How to Use Requirements: a linux bootable USB, this repo on the USB (not in the OS, just put it in the root directory) chromepasswords.py requires PyWin32 If the computer is locked: 1) shutdown windows (make sure not hibernating by holding shift while pressing shut down) 2) hit F12 and select USB 3) sudo -i 4) fdisk -l (note: if you’re on Kali Linux, run parted -l) 5) mkdir /media/windows 6) mount /dev/WHATEVERTHEWINDOWSPARTITIONWASCALLED /media/windows -t ntfs 7) run Stickykeys.sh 8) restart and boot to Windows 9) hit Shift 5 times fast, a command prompt will appear 10) cd to the USB and run WinPirate.bat If the computer isn’t locked: cd to the USB and run Run.bat (this will run WinPirate.bat silently in the background, it should be done in < 10 seconds Current Issues 1) The chrome passwords grabber that I made is still a .py For it to work, I need to convert it to exe so it doesn’t require python to be installed on the system. You can run it with python chromepasswords.py -csv and it will decrypt the Chrome saved passwords database and export it as a CSV 2) The sticky keys automation doesn’t speed the process up as much as I previously thought, as evident by the lengthy “How to Use” section 3) I haven’t been able to write any tools that grab passwords for IE or Firefox Source: https://github.com/pourquoibenoit/WinPirate
ezhil56x / DeautherWi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deauthentication, and monitoring. Use responsibly and comply with applicable laws.
echosdr / EchoA native iOS SDR command center for the KiwiSDR, OpenWebRX, WebSDR, & FM-DX networks.
RightToPrivacy / Wipri(Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing w/Brand Mimics: run as command or optional new randomized identity each boot; includes flags for continually changing random times/changing valid OUI addresses + Hostname randomizer + Device/Signal/location anonymization
Ideefixze / TutorialUnityMultiplayerHow to use Command Design Pattern to make custom networking for Unity?
hellt / CmdoCommando - run commands against networking devices in batch mode
viehgroup / Information GatheringProject Idea Briefing • The primary benefit of ethical hacking is to prevent data from being stolen and misused by malicious attackers, as well as: Discovering vulnerabilities, Scanning network. In this cyber security domain, there are various types of tools are available but day by days security issues and our technology are updated. We are creating some tools like port scanner, network scanner, mac address changer, and some others tools. A hacking tool is a program designed to assist a hacker with hacking. • These tool use by any company or any individuals person for collect information, scan port, fuzzing, and some more thing. Project Working I use Command line interface for project. This project for beginner and help those people they gather information about Email Header Analysis, Instagram Information, Instagram Username Check, Ip Information, Phone Number Information, Port Scan, Web scraping, give fake information. This tool shows your hostname and public IP first and check your internet speed, then user give input and according to option this tool work.
jsdelivr / Globalping MCP ServerRemote MCP server that gives LLMs access to run network commands
jsjfai / AgentDNS Lite ClientAgentDNS-lite-client is a lightweight command-line tool for interacting with the AgentDNS network. It enables fast querying and invocation of intelligent agents directly from your terminal.
egcodes / Bumeranga command-line tool that allows file transfer between computers on the local network with password protected
stellar-deprecated / InterstellarDEPRECATED. The Interstellar Module System is an open ecosystem of modules that aims to make it easy to build a web application on the Stellar network. This repository (interstellar) contains a command line tool that standardizes the build process for Stellar web applications based on the module configuration.
pekman / Netns ExecRun command in Linux network namespace as normal user
mike-bourgeous / CliserverA sample libevent-based network socket server that presents a simple command line interface to multiple connecting clients.
Err0r-ICA / NojleThe Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands and services ,it also automates some network scanning like port scan , network enumeration, Vulnerability scanning and so on. This Tool can Automate some Digital Forensics practices to make a research on evidence even easier. This Tool is still in developement ,so this is an early access version of NoJle. Note: Use Kali Linux to run this code. IMPORTANT:THIS TOOL IS FOR EDUCATIONAL PURPOSES ONLY. WE ARE NOT RESPONSIBLE FOR ANY BLACKHAT ACTIVITY.
javonn13 / AWS Basic For BeginnersThis course will teach you AWS basics right through to advanced cloud computing concepts. Ideal for beginners - absolutely no cloud computing experience is required! There are lots of hands-on exercises using an AWS free tier account to give you practical experience with Amazon Web Services. Visual slides and animations will help you gain a deep understanding of Cloud Computing. This is the perfect course for Beginners to the Cloud who want to learn the fundamentals of AWS - putting you in the perfect position to launch your AWS Certification journey and career in cloud computing. 👍 Download the course code and files here: https://digitalcloud.training/aws-bas... 👍 Access your free Guide to AWS Certifications (ebook) here: https://digitalcloud.training/aws-fre... 🎥 Course developed by Neal Davis - Founder of Digital Cloud Training 🔗 Check out the Digital Cloud Training YouTube channel: https://www.youtube.com/c/digitalclou... ⭐️ Course Contents ⭐️ (00:00:00) Course Introduction Section 1 - AWS Basics (00:00:53) Introduction (00:01:19) Amazon Web Services Overview (00:04:26) AWS Global Infrastructure (00:07:35) AWS Pricing (00:15:37) Setup your AWS Free Tier Account (00:21:19) Create a Billing Alarm (00:27:34) IAM Overview (00:32:47) Create IAM User and Group (00:37:38) Amazon Virtual Private Cloud (VPC) (00:48:36) Security Groups and Network ACLs (00:58:40) AWS Public and Private Services (01:00:51) Install the AWS Command Line Interface Section 2 - Amazon Elastic Compute Cloud (EC2) (01:02:08) Introduction (01:02:36) Amazon EC2 Overview (01:08:00) Launching an Amazon EC2 Instance (01:16:42) Connecting to Amazon EC2 Instances (01:27:48) Create a Website Using User Data (01:33:52) Using Access Keys with EC2 (01:34:50) Using IAM Roles with EC2 (01:39:05) Scale Elastically with Amazon EC2 Auto Scaling (01:47:47) Create a Target Tracking Scaling Policy (01:55:43) Add Load Balancing with Amazon ELB Section 3 - AWS Storage Services (02:09:52) Introduction (02:10:28) AWS Storage Services Overview (02:12:40) Create an Attach EBS Volume (02:20:47) Instance Store Volumes (02:23:34) EBS Snapshots and AMIs (02:31:38) Create Amazon EFS File System (02:40:26) Amazon S3 Create Bucket and Make Public (02:47:32) Working with S3 Objects from the AWS CLI Section 4 - AWS Databases (02:52:49) Introduction (02:53:28) Amazon RDS Overview (02:59:52) Create Amazon RDS Multi-AZ (03:10:35) Add an Amazon RDS Read Replica (03:16:18) Install WordPress on EC2 with RDS Database (03:23:56) Amazon DynamoDB Section 5 - Automation on AWS (03:34:34) Introduction (03:35:34) How to Deploy Infrastructure Using AWS CloudFormation (03:37:36) Create Simple Stacks with AWS CloudFormation (03:47:52) Create Complex Stack with AWS CloudFormation (03:56:45) Deploy an Application Using AWS Elastic Beanstalk Section 6 - DevOps on AWS (04:02:00) Introduction (04:02:43) Continuous Integration and Continuous Delivery (CI/CD) (04:05:55) AWS CodePipeline with AWS Elastic Beanstalk (04:15:26) Create AWS CodeStar Project Section 7 - DNS Services and Content Delivery (04:25:47) Introduction (04:26:23) Amazon Route 53 Overview and Routing Policies (04:30:22) Register Domain Using Route 53 (04:35:44) Create Amazon CloudFront Distribution with S3 Static Website (04:44:30) Add an SSL/TLS Certificate and Route 53 Alias Record Section 8 - Docker Containers and Serverless Computing (04:53:35) Introduction (04:54:34) Docker Containers on Amazon ECS (05:06:06) Serverless with AWS Lambda Section 9 - Application Integration and Loose Coupling (05:13:12) Introduction (05:14:01) Amazon SNS and Amazon SQS (05:16:32) AWS Lambda to Amazon SQS Event Source Mapping (05:22:49) Serverless Application - Amazon SQS, SNS, and Lambda 🔗 Digital Cloud Training: https://digitalcloud.training/ 🔗 LinkedIn: https://www.linkedin.com/in/nealkdavis/ 🔗 Twitter: https://twitter.com/nealkdavis 🔗 Instagram: https://www.instagram.com/digitalclou... 👍 AWS Cloud Practitioner - https://digitalcloud.training/amazon-... 👍 AWS Solutions Architect Associate - https://digitalcloud.training/amazon-...